![]() |
![]()
| ![]() |
![]()
NAMEpki --est - Enroll an X.509 certificate with an EST server SYNOPSIS
DESCRIPTIONThis sub-command of pki(1) sends a PKCS#10 certificate request via HTTPS to a server using the Enrollment over Secure Transport (EST) Protocol (RFC 7030). After successful authorization which with manual authentication requires periodic polling by the enrollment client, the EST server returns an X.509 certificate signed by the CA. Before the expiry of the current certificate, a new client certificate based on a fresh private key can be requested, using the old certificate and the old key for automatic TLS client authentication with the EST server. OPTIONS
EXAMPLESTo save some typing work the following command line options are stored in a est.opt file: --url https://pki.strongswan.org:8443 --cacert tlsca.crt --cacert tlsca-1.crt --cacert myca.crt --cacert myca-1.crt NOTE: For a successful HTTPS connection, trust must be established into the EST server certificate. The TLS trust chain including the root CA certificate and optionally intermediate CA certificates must be given using multiple --cacert options. The --cacert option must also be used to be able to verify the received client certificate issued by the CA. This second trust chain might be identical to the TLS trust chain (if the EST server is using a TLS server certificate issued by its own CA) or might be totally different, e.g. if a Let's Encrypt EST server certificate is used. With the following command, an X.509 certificate signed by the intermediate CA is requested from an EST server based on a PKCS#10 certificate request: pki --options est.opt --in moonReq.der > moonCert.der negotiated TLS 1.3 using suite TLS_AES_256_GCM_SHA384 received TLS server certificate 'C=CH, O=strongSwan Project, CN=pki.strongswan.org' This certificate can be renewed some time before it expires with the command: pki --options est.opt --in moonReqNew.der --cert moonCert.der --key moonKey.der > moonCertNew.der negotiated TLS 1.3 using suite TLS_AES_256_GCM_SHA384 received TLS server certificate 'C=CH, O=strongSwan Project, CN=pki.strongswan.org' If the private key and the certificate of the client is stored in a TPM 2.0, the renewal can be done with the following options: pki --options est.opt --in moonReqNew.der --certid 0x01800004 --keyid 0x81010004 > moonCertNew.der SEE ALSOpki(1)
|